Mysterium the first tool which permits you to retrieve the most part of a Python code even the .py or .pyc was extracted from an executable file, even it is encrypted with every existing encryptage. Mysterium don't make any difference between encrypted and non encrypted files, it can retrieve code from Pyarmor or .pyc files.

Overview

­ ­ ­ ­ ­ 𝙈 ­ ­ ­ ­ ­ ­ ­ 𝙔 ­ ­ ­ ­ ­ ­ ­ 𝙎 ­ ­ ­ ­ ­ ­ ­ 𝙏 ­ ­ ­ ­ ­ ­ ­ 𝙀 ­ ­ ­ ­ ­ ­ ­ 𝙍 ­ ­ ­ ­ ­ ­ ­ 𝙄 ­ ­ ­ ­ ­ ­ ­ 𝙐 ­ ­ ­ ­ ­ ­ ­ 𝙈

mysterium_logo (1)

Mysterium has been entirely made by @venaxyt, helped by @IDRALOU.
Mysterium usage:
- If the file to be inspect extension is ".py" or ".pyc": You only have to drag it into Mysterium.
- If the file to be inspect extension is ".exe": If you don't know how to decompile an executable Python file, so you can wait for next Mysterium updates.
- If the file to be inspect is obfuscated with Pyarmor: You put the Python file and the pytrandform folder into a zip file, drag it into Mysterium and input the Python file name.

mysterium

YouTube Tutorial (FR): https://www.youtube.com/watch?v=96qq6OmmHZE

Mysterium official Discord server: https://discord.gg/ccufCedf44

V ­ ­ E ­ ­ N ­ ­ A ­ ­ X

Comments
  • Help in decompiling pyarmor

    Help in decompiling pyarmor

    Hello friend, could you help me with decompiling the encrypted python file, The problem is that there is a Python project, but it is encrypted using Pyarmor, The source code is there and everything adjacent to it too Thanks in advance

    opened by Naster17 5
  • Can mysterium also deob the Super Mode?

    Can mysterium also deob the Super Mode?

    I have a file that ends with .pyd instead of the pytransform folder. I think its the Super Mode of PyArmor...

    can mysterium deop this mode?

    Super Mode

    opened by nabil-ak 4
  • TypeError: unsupported operand type(s) for |: 'str' and 'str'

    TypeError: unsupported operand type(s) for |: 'str' and 'str'

    any help?

      [>] Enter uninspected file path : zaz.pyc
    
    import random
    import re
    import re
    re.escape(~)
    re.escape(})
    re.escape(|=)
    re.escape(|)
    re.escape({)
    re.escape(^=)
    re.escape(^)
    re.escape(])
    re.escape([)
    re.escape(@=)
    re.escape(@)
    re.escape(>>=)
    re.escape(>>)
    re.escape(>=)
    re.escape(>)
    re.escape(==)
    re.escape(=)
    re.escape(<=)
    re.escape(<<=)
    re.escape(<<)
    re.escape(<)
    re.escape(;)
    re.escape(:=)
    re.escape(:)
    re.escape(/=)
    re.escape(//=)
    re.escape(//)
    re.escape(/)
    re.escape(...)
    re.escape(.)
    re.escape(->)
    re.escape(-=)
    re.escape(-)
    re.escape(,)
    re.escape(+=)
    re.escape(+)
    re.escape(*=)
    re.escape(**=)
    re.escape(**)
    re.escape(*)
    re.escape())
    re.escape(()
    re.escape(&=)
    re.escape(&)
    re.escape(%=)
    re.escape(%)
    re.escape(!=)
    re.escape($)
    Traceback (most recent call last):
      File "CNPFLOOD.py", line 3, in <module>
      File "/opt/virtualenvs/python3/lib/python3.8/site-packages/discord/__init__.py", line 23, in <module>
        import logging
      File "/usr/lib/python3.8/logging/__init__.py", line 28, in <module>
        from string import Template
      File "/usr/lib/python3.8/string.py", line 80, in <module>
        class Template(metaclass=_TemplateMetaclass):
      File "/usr/lib/python3.8/string.py", line 77, in __init__
        cls.pattern = _re.compile(pattern, cls.flags | _re.VERBOSE)
    TypeError: unsupported operand type(s) for |: 'str' and 'str'
    
      [>] The code is finished, don't forget to follow @venaxyt / @IDRALOU / @Bleu-No / @vjousse on Github
    
    opened by pp0236 2
  • Error

    Error

    File "C:\Users\Carry\Desktop\mysterium-main\modules\blue.py", line 173, in execute_file exec(self.content, globals(), self.variables) File "", line 3, in ModuleNotFoundError: No module named 'pytransform'

    opened by CarryLambo 2
  • TypeError when trying to inspect file

    TypeError when trying to inspect file

    The following error pops up when I try to inspect a file:

    [>] Enter uninspected file directory : C:\Users\Erk\Desktop\reverse\TheRigsNitro.exe_extracted\grabitbitch.pyc

    import re import json re.escape($) Traceback (most recent call last): File "grabitbitch.py", line 10, in File "C:\Users\Erk\AppData\Local\Programs\Python\Python39\lib\urllib\request.py", line 88, in import http.client File "C:\Users\Erk\AppData\Local\Programs\Python\Python39\lib\http\client.py", line 71, in import email.parser File "C:\Users\Erk\AppData\Local\Programs\Python\Python39\lib\email\parser.py", line 12, in from email.feedparser import FeedParser, BytesFeedParser File "C:\Users\Erk\AppData\Local\Programs\Python\Python39\lib\email\feedparser.py", line 27, in from email._policybase import compat32 File "C:\Users\Erk\AppData\Local\Programs\Python\Python39\lib\email_policybase.py", line 7, in from email import header File "C:\Users\Erk\AppData\Local\Programs\Python\Python39\lib\email\header.py", line 16, in import email.quoprimime File "C:\Users\Erk\AppData\Local\Programs\Python\Python39\lib\email\quoprimime.py", line 44, in from string import ascii_letters, digits, hexdigits File "C:\Users\Erk\AppData\Local\Programs\Python\Python39\lib\string.py", line 146, in Template.init_subclass() File "C:\Users\Erk\AppData\Local\Programs\Python\Python39\lib\string.py", line 85, in init_subclass cls.pattern = _re.compile(pattern, cls.flags | _re.VERBOSE) TypeError: unsupported operand type(s) for |: 'str' and 'str'

    [>] The code is finished, don't forget to follow @venaxyt and @IDRALOU on Github

    opened by Nqndi 2
  • unsucessful in deobfuscating pyarmor obfuscation.

    unsucessful in deobfuscating pyarmor obfuscation.

    deobfuscate.zip contains my obfuscated app code in zip format pyarmor==7.3.6

    $ uname -a
    Darwin
    

    [>] Enter uninspected file path : /Users/username/app-code/mysterium/deobfuscate.zip [>] Enter Python obfuscated file name with extension : deobfuscate/init.py

    Traceback (most recent call last): File "modules/deobfuscate/init.py", line 1, in from .pytransform import pyarmor_runtime ModuleNotFoundError: No module named 'main.pytransform'; 'main' is not a package

    obfuscated init.py

    from .pytransform import pyarmor_runtime
    pyarmor_runtime()
    __pyarmor__(__name__, __file__, b'\x50\x59\x4ca....', 2)
    

    source init.py

    __version__ = '1.0.0.0'
    
    opened by vaibhav-rbs 1
  • Does this only work with the pyarmor trial version?

    Does this only work with the pyarmor trial version?

    Is it possible to decrypt premium pyarmor? Your tutorial requires me to obfuscate an init.py file. Without access to the pyarmor capsule that was used for the real entry script, how do I make this work?

    opened by whiteowl3 1
  • Error after deleting re.py

    Error after deleting re.py

    Hello! After deleting re.py, I get the following error:

    import random import json import requests Traceback (most recent call last): File "<C:\Users\Administrator\Desktop\mysterium-main\modules\main.py>", line 3, in File "", line 6, in ImportError: cannot import name 'randint' from 'random' (C:\Users\Administrator\Desktop\mysterium-main\modules\random.py)

    How can I fix this?

    opened by Oberonskiiv2 1
  • Why doesn't it output the source code?

    Why doesn't it output the source code?

    I did everything as in the guide (), but when I start mysterium.py, it just executes the script, but does not output the code. mysterium output:

    [>] Enter uninspected file path : C:\Users\katy\Desktop\mysterium\FINAL_VIRUS.zip
     [>] Enter Python obfuscated file name with extension : C:\Users\katy\Desktop\mysterium\modules\FINAL_VIRUS\virus.pyc
    
    3.9.6 (tags/v3.9.6:db3ff76, Jun 28 2021, 15:26:21) [MSC v.1929 64 bit (AMD64)]
    
     [>] The code is finished, don't forget to follow @venaxyt / @IDRALOU / @Bleu-No / @vjousse on Github
    

    source virus.py:

    import sys
    
    def print_ver(version):
    	print(version)
    
    x = sys.version
    print_ver(x)
    
    opened by ghost 1
  • VERY Unsecure... executes the virus...

    VERY Unsecure... executes the virus...

    The idea of this tool is ngl pretty good... but you can easily get a virus with Mysterium. Mysterium will execute the virus just by creating additionnal libraries, but if the file (virus) uses another libs, or works in a different way, your computer could get infected.

    opened by billythegoat356 1
  • No such file or directory

    No such file or directory

    BRO MAKE IT SUPPORT LINUX PATH!!!

    Traceback (most recent call last):
    File "/home/abdullahsh/Desktop/fucking/mysterium/mysterium.py", line 202, in
    modules.blue.Blue(f'modules\{uninspected_file_name}.{uninspected_file_extension}', uninspected_file_directory)
    File "/home/abdullahsh/Desktop/fucking/mysterium/modules/blue.py", line 39, in init
    self.reading_file()
    File "/home/abdullahsh/Desktop/fucking/mysterium/modules/blue.py", line 95, in reading_file
    with open(self.filePath, 'rb') as f:
    FileNotFoundError: [Errno 2] No such file or directory: 'modules\uninspected.pyc'

    opened by 51L3N7-X 1
  • IndexError: tuple index out of range

    IndexError: tuple index out of range

    I was have this error "str object has no attribute match", and i used this solution #26, but after than i have a new error "IndexError: tuple index out of range", i dont know how solve this. Help me pls

    Python version: 3.10.2

    opened by IosaPRS 0
  • nothing happen after running the mysterium on the code

    nothing happen after running the mysterium on the code

    I have an obfuscated flask app that has an encrypted .py file which is like so:

    from pytransform import pyarmor_runtime pyarmor_runtime() pyarmor(name, file, b'\x50\x59\x ......

    the app is a flask app and when I zip it and put it in the mysterium it will only run the flask app and nothing else happen. I have to stop the code with ctrl +c and the mysterium print the exit banner and nothing happen. what should I do and how should I proceed with this?

    opened by mostafashr 0
  • exe to py error

    exe to py error

    I dragged and dropped the exe which has to be decompiled/deobfuscated into Mysterium. Then it decompiled it into a .pyc file, then it asked me for the file name with extension and i typed in the filename with extension .pyc . I pressed enter, then it said its finished but there was no decompiled file

    opened by MJMODZZ 0
  • 'str' object has no attribute 'match'

    'str' object has no attribute 'match'

    Hello. Does mysterium work with new PyArmor versions? I just tried some obfuscated code that runs fine on Windows 10 64-bit and Python 3.8.6, but when I pass it through Mysterium the output is:

    import re
    import re
    re.escape(w)
    re.escape(i)
    re.escape(n)
    re.escape(d)
    re.escape(o)
    re.escape(w)
    re.escape(s)
    'str' object has no attribute 'match'
    
     [>] The code is finished, don't forget to follow @venaxyt / @IDRALOU / @Bleu-No / @vjousse on Github
    
    opened by ddrm86 1
Generate bitcoin public and private keys and check if they match a filelist of existing addresses that have a nonzero balance

btc-heist Running Install deps, i.e., python3 -m pip install -r requirements.txt Download the CSV dump of all bitcoin addresses with a balance and cut

Denis Khoshaba 103 Dec 5, 2022
This python module can analyse cryptocurrency news for any number of coins given and return a sentiment. Can be easily integrated with a Trading bot to keep an eye on the news.

Python script that analyses news headline or body sentiment and returns the overall media sentiment of any given coin. It can take multiple coins an

null 185 Dec 22, 2022
Privfiles - Encrypted file storage using Fernet with zero Javascript

Privfiles - Encrypted file storage using Fernet with zero Javascript Source code for the onion service: l3n6v6dm63frml22tlmzacnasvp7co7wylu4hhcs34ukxe

Ward 5 Jul 30, 2022
Privfiles - Encrypted file storage using Fernet with zero Javascript

Privfiles - Encrypted file storage using Fernet with zero Javascript Source code for the onion service: l3n6v6dm63frml22tlmzacnasvp7co7wylu4hhcs34ukxe

null 5 Jul 30, 2022
Encrypt your code without a worry. Stark utilizes the base64, hashlib and Crypto lib to encrypt your code which cannot be decrypted with any online tools.

Stark Encrypt your code without a worry. Stark utilizes the base64, hashlib and Crypto lib to encrypt your code which cannot be decrypted with any onl

cliphd 3 Sep 10, 2021
A tool that can encrypt python2 or python3 code with the given password and can reuse with that password

A tool that can encrypt python2 or python3 code with the given password and can reuse with that password

Md Rasel Bhuyan 3 Feb 28, 2022
Get the SHA256 hash of any file with this Python Script

Hashfile-SHA256 A SHA256 hash verifying script, written in python. Report Bug Table of Contents About The Project Built With Getting Started Prerequis

Ethan Gallucci 1 Nov 1, 2021
This program can encrypt and decrypt your files so that they can no longer be identified.

File_Cryptographer Table of Contents: About the Program Features Requirements Preview Credits Reach Me See Also About the Program: with this program,

Sina.f 6 Nov 20, 2022
Retrieve ECDSA signature R,S,Z values from blockchain rawtx or txid.

rsz Retrieve ECDSA signature R,S,Z values from blockchain rawtx or txid. Info The script parse the data of rawtx to fetch all the inputs in the transa

iceland 29 Nov 18, 2022
This program can encrypt/ decrypt any string

Ceasar_cipher Hey this is J0ey, this program is a very basic Caesar cipher encoder/decoder. In order to use this program, you will need to have Python

null 1 Jan 11, 2022
The Intelligent Bitcoin Miner, Part II

The Intelligent Bitcoin Miner, Part II At a Glance This app simulates the behavior and profitability of Bitcoin miners for The Intelligent Bitcoin Min

Karim Helmy 20 Dec 16, 2022
Hyval will store your information encrypted and decrypt it when needed

Hyval will store your information encrypted and decrypt it when needed

soroush safari 3 Oct 31, 2021
Fully configurable automated python script to collect most visted pages based on google dork

Ranked pages collector Fully configurable automated python script to collect most visted pages based on google dork Usage This project is still under

Security Analyzer 9 Sep 10, 2022
A python implementation of our standard object-oriented encryption package, shipped with most apps.

Encryption Manager (python edition) VerseGroup's native encryption manager adapted for python applications. Function Generate new set of private and p

Verse Group LLC 2 Oct 30, 2022
PyBeacon is a collection of scripts for dealing with Cobalt Strike's encrypted traffic.

PyBeacon is a collection of scripts for dealing with Cobalt Strike's encrypted traffic. It can encrypt/decrypt beacon metadata, as well as pa

NCC Group Plc 162 Dec 21, 2022
Generate simple encrypted messages!

Premio's Shift is a very simple text encryption, you can use it to send secret messages to your friends. Table of Content Table of Content How it work

Peterson Adami Candido 3 Aug 6, 2021
Get the length of the Instagram encrypted password

instagram-weak-encryption Get the length of the Instagram encrypted password Introduction Instagram and Facebook encrypt the password submitted at log

Giuseppe Criscione 19 Dec 9, 2022
This is an experimental AES-encrypted RPC API for ESP 8266.

URPC This is an experimental AES-encrypted RPC API for ESP 8266. Usage The server folder contains a sample ESP 8266 project. Simply set the values in

Ian Walton 1 Oct 26, 2021
theHasher Tool created for generate strong and unbreakable passwords by using Hash Functions.Generate Hashes and store them in txt files.Use the txt files as lists to execute Brute Force Attacks!

$theHasher theHasher is a Tool for generating hashes using some of the most Famous Hashes Functions ever created. You can save your hashes to correspo

SR18 6 Feb 2, 2022